For scientific papers on AGW, record happenings in the Arctic and the Greenland, Himalayan and Antarctic icesheets. Also weatherstorms and higher than average rainfalls and other extreme weather events.

Here's one more way to get your hands on a Tesla Model 3: just break into it. No, not like some common everyday street criminal. Rather, like a hot pocket-eating 15-year old computer nerd. Facile stereotypes aside, we are serious, though. Trend Micro’s Zero Day Initiative (ZDI) Pwn2Own is a competition that matches computer security researchers against certain targets, rewarding the most successful with prizes. This year, the contest gets an automotive category, and its new target, a mid-size Mid Range rear-wheel drive Tesla sedan, is also one of the prizes.

There you go Dax, some easy money for you , you can sell the Tesla after you break in to help fund your Rivian

Bongalong... for some reason women are just so superior to anything that ever existed or will ever exist!
Shellandshilo1956 ….. Even an annoying troll, has the right to free speech.

Bongalong wrote:So, Dax, the default is that autonomous cars are connected to the internet?

*** HELLO FACEBOOK-AUTONOMOUS-FREIGHT I SAY.... frig me dead

Ignorance is bliss for clones isn't it, you can all laugh at my claims of hacking of evs, but it's already happening and as they use proprietary software which needs constant upgrading, then hacking them is easy. Walt until they start hacking autonomous cars and changing their operating parameters and there s nothing that can be done about it when you user proprietary software, which is open ended to the net so it can operate.

They can launch attacked from the road side, over the net and just about any where an ev is connected and for autonomous, that's 24/7.

Here's one more way to get your hands on a Tesla Model 3: just break into it. No, not like some common everyday street criminal. Rather, like a hot pocket-eating 15-year old computer nerd. Facile stereotypes aside, we are serious, though. Trend Micro’s Zero Day Initiative (ZDI) Pwn2Own is a competition that matches computer security researchers against certain targets, rewarding the most successful with prizes. This year, the contest gets an automotive category, and its new target, a mid-size Mid Range rear-wheel drive Tesla sedan, is also one of the prizes.

There you go Dax, some easy money for you , you can sell the Tesla after you break in to help fund your Rivian

Here's one more way to get your hands on a Tesla Model 3: just break into it. No, not like some common everyday street criminal. Rather, like a hot pocket-eating 15-year old computer nerd. Facile stereotypes aside, we are serious, though. Trend Micro’s Zero Day Initiative (ZDI) Pwn2Own is a competition that matches computer security researchers against certain targets, rewarding the most successful with prizes. This year, the contest gets an automotive category, and its new target, a mid-size Mid Range rear-wheel drive Tesla sedan, is also one of the prizes.

There you go Dax, some easy money for you , you can sell the Tesla after you break in to help fund your Rivian

Talk about dodgy... oh well: the law is what the law does!

Reading up one new FSD (full Self Driving) computer Tesla have made, it's now even harder to hack into the computer, for one they have made the chips in house and they will only accept data from Tesla with a signature, they also have a double redundancy, so each computer has 2 chips going the same time and check each other if the same information is working... so if one is deferent or stops working the car will just find somewhere safe and pull over until it's resolved.
They have made their own software for it so a hacker would need to know the software.
So to hack into a Tesla car they will first have to override a signal going into the car then work out how the software works then, trick the hardware its from Tesla, then take over the hardware implemented override on the 2 chips...
Considering no one has code for the software or the hardware, of course it wont be imposable but it would take a large group with lots of money to copy what Tesla have done little on program it.
On a follow up on the hacking into the Tesla 3 car, one group did and had access to the web browser (inserted a YouTube video) but couldn't get into any of the cars operating systems. (that was with the old generic computer they used to use), now it just got harder.

Bongalong... for some reason women are just so superior to anything that ever existed or will ever exist!
Shellandshilo1956 ….. Even an annoying troll, has the right to free speech.